You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -97,6 +102,28 @@ Use [wabt](https://github.com/WebAssembly/wabt) to compile `.wat` to `.wasm`
97
102
wat2wasm demo.wat
98
103
```
99
104
105
+
## Security
106
+
107
+
<!-- YAML
108
+
added: REPLACEME
109
+
changes:
110
+
- version: REPLACEME
111
+
pr-url: https://github.com/nodejs/node/pull/50396
112
+
description: Clarify WASI security properties.
113
+
-->
114
+
115
+
WASI provides a capabilities-based model through which applications are provided
116
+
their own custom `env`, `preopens`, `stdin`, `stdout`, `stderr`, and `exit`
117
+
capabilities.
118
+
119
+
**The current Node.js threat model does not provide secure sandboxing as is
120
+
present in some WASI runtimes.**
121
+
122
+
While the capability features are supported, they do not form a security model
123
+
in Node.js. For example, the file system sandboxing can be escaped with various
124
+
techniques. The project is exploring whether these security guarantees could be
125
+
added in future.
126
+
100
127
## Class: `WASI`
101
128
102
129
<!-- YAML
@@ -107,9 +134,7 @@ added:
107
134
108
135
The `WASI` class provides the WASI system call API and additional convenience
109
136
methods for working with WASI-based applications. Each `WASI` instance
110
-
represents a distinct sandbox environment. For security purposes, each `WASI`
111
-
instance must have its command-line arguments, environment variables, and
0 commit comments